Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("INFORMATION PROTECTION")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2850

  • Page / 114
Export

Selection :

  • and

FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEMQUISQUATER JJ; COUVREUR C.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 21; PP. 905-907; BIBL. 13 REF.Article

MESSAGE REDUNDANCY REDUCTION BY MULTIPLE SUBSTITUTION: A PREPROCESSING SCHEME FOR SECURE COMMUNICATIONSLU SC; LEE LN.1979; COMSAT TECH. REV.; USA; DA. 1979; VOL. 9; NO 1; PP. 37-47; BIBL. 4 REF.Article

TO INTERNATIONAL REGULATIONS ON DATA FLOWS AND PRIVACY PROTECTION.STADLER G.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 95-112; BIBL. 12 REF.Conference Paper

TRANSCRIPT OF AD HOC PRESENTATION.JOINET L.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 277-280Conference Paper

CONFIDENTIALITY OF INFORMATIONROOS H.1981; INF. MANAGE.; ISSN 0378-7206; NLD; DA. 1981; VOL. 4; NO 1; PP. 17-21; BIBL. 3 REF.Article

HOW TO TELL AN HONEST PROGRAMMERCARROLL JM.1978; MIEUX COMMUNIQUER L'INFORMATION: UNE NOUVELLE ETAPE. CONFERENCE CANADIENNE DES SCIENCES DE L'INFORMATION. 6/1978/MONTREAL; CAN; OTTAWA: ASSOCIATION CANADIENNE DES SCIENCES DE L'INFORMATION; DA. 1978; PP. 178-189; ABS. FRE; BIBL. 7 REF.Conference Paper

WORK PAPER ON TRANSBORDER INFORMATION FLOWS: REQUIREMENTS FOR A NEW INTERNATIONAL FRAMEWORKPIPE GR.1976; LAW COMPUTER TECHNOL.; U.S.A.; DA. 1976; VOL. 9; NO 1; PP. 17-26; BIBL. 9REF.Article

COPING WITH CATASTROPHE: IMPLICATIONS TO INFORMATION SYSTEMS DESIGNGILCHRIST B.1978; J. AMER. SOC. INFORM. SCI.; USA; DA. 1978; VOL. 29; NO 6; PP. 271-277; BIBL. 12 REF.Article

IMPLEMENTATION OF PRIVACY AND SECURITY REQUIREMENTS IN TRANSNATIONAL DATA PROCESSING SYSTEMS.TURN R.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 113-132; BIBL. 2 P.Conference Paper

THE COUNCIL OF EUROPE'S DATA PROTECTION PRINCIPLES.HONDIUS FW.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 47-54Conference Paper

ORDNUNG UND SICHERHEIT IM BETRIEBSARCHIV. = REGLEMENT ET SECURITE DANS LES ARCHIVES D'UNE ENTREPRISEGUNZEL W.1976; ARCHIVMITTEILUNGEN; DTSCH.; DA. 1976; VOL. 26; NO 2; PP. 72Article

EXPERTENSTUDIE ZUM DATENSCHUTZ VORGELEGT = PRESENTATION D'UNE ETUDE D'EXPERTS RELATIVE A LA PROTECTION DES DONNEES1975; NACHR. DOKUMENT.; DTSCH.; DA. 1975; VOL. 26; NO 4-5; PP. 184-185Article

REGULATION OF INTERNATIONAL INFORMATION FLOWSMAISONROUGE JG.1981; INFORMATION (THE) SOCIETY; ISSN 513709; USA; DA. 1981; VOL. 1; NO 1; PP. 17-30Article

ZUR FRAGE DER ETHIK IN FACHINFORMATION UND -KOMMUNIKATION = SUR LE PROBLEME DE L'ETHIQUE DANS L'INFORMATION ET LA DOCUMENTATION SPECIALISEESCAPURRO R.1981; NACHR. DOK.; ISSN 0027-7436; DEU; DA. 1981; NO 1; PP. 9-12; ABS. ENG; BIBL. 20 REF.Article

PRIVACY, SECURITY AND RESPONSIBILITY.BENJAMIN AA.1978; IN: TRANSNATL DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES LTD; DA. 1978; PP. 1-8Conference Paper

THE SWEDISH DATA ACT.FREESE J.1978; IN: TRANSNATL. DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES; DA. 1978; PP. 197-207Conference Paper

FREEDOM OF INFORMATION IN CANADAMCCAMUS JD.1983; GOVERNMENT PUBLICATIONS REVIEW (1982); ISSN 51215X; GBR; DA. 1983; VOL. 10; NO 1; PP. 51-60; BIBL. 38 REF.Article

EXTENSION OF RSA CRYPTO-STRUCTURE: A GALOIS APPROACH. REPLYDELSARTE P; PIRET P; KRAVITZ DW et al.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 3; PP. 582-583; BIBL. 4 REF.Article

SOME SYSTEMS FOR MODELING COMPUTER SECURITY REQUIREMENTSRINE DC.1981; APPLIED SYSTEMS AND CYBERNETICS. INTERNATIONAL CONGRESS ON APPLIED SYSTEMS RESEARCH AND CYBERNETICS/1980/ACAPULCO; USA/GBR/FRA; NEW YORK; OXFORD; PARIS: PERGAMON PRESS; DA. 1981; PP. 2228-2245; BIBL. 17 REF.Conference Paper

COMMUNICATIONS SECURITY WITH ELECTRONIC MAILWOOD CC.1980; OFFICE; USA; DA. 1980; VOL. 92; NO 2; PP. 22-158; 4 P.Article

PRIVACY OF DATA IN EDUCATIONHUSSAIN KM.1979; COMPUTERS AND EDUC.; GBR; DA. 1979; VOL. 3; NO 2; PP. 63-68; BIBL. 26 REF.Article

A SIMPLE AND EFFECTIVE PUBLIC-KEY CRYPTOSYSTEMLU SC; LEE LN.1979; COMSAT TECH. REV.; USA; DA. 1979; VOL. 9; NO 1; PP. 15-24; BIBL. 6 REF.Article

PROBLEM AREAS IN COMPUTER SECURITY ASSESSMENT.GLASEMAN S; TURN R; GAINES S et al.1977; RAND-P-5822; U.S.A.; DA. 1977; PP. 1-29; BIBL. 1 P. 1/2; (NATL. COMPUT. CONF.; DALLAS, TEX.; 1977)Report

AU COEUR DU DEBAT "INFORMATIQUE ET LIBERTES": LE CHARGE DE LA SECURITE DES DONNEES. PROFIL PERSONNEL, DROITS ET OBLIGATIONS.1977; BUR. ET INFORMAT.; FR.; DA. 1977; NO 49; PP. 41-42Article

AN OVERVIEW OF THE EMERGING STATUTORY "RIGHT" OF INFORMATION PRIVACY.ANDREWS WH.1977; LAW COMPUTER TECHNOL.; U.S.A.; DA. 1977; VOL. 10; NO 4; PP. 82-94; BIBL. 1 REF.Serial Issue

  • Page / 114